Open in app

Sign In

Write

Sign In

Luis Francisco Monge Martinez
Luis Francisco Monge Martinez

53 Followers

Home

Lists

About

May 10

Using LLMs and GPT to streamline data analysis in cybersecurity incidents.

Or another way to forget programming 😁 — Introduction It is difficult to consider writing an article about ChatGPT and not feel like one of those who join the trend and try to talk about a topic simply because everyone else is doing it. I think that since I started my working life, this has been the moment in…

Llm

11 min read

Using LLMs and GPT to streamline data analysis in cybersecurity incidents.
Using LLMs and GPT to streamline data analysis in cybersecurity incidents.
Llm

11 min read


Apr 10

Hunting threats without leaving home- Part V

Jupyter Notebooks 🪐 Previus post: Intro I, Intro II, Analizing our data and Grafiki. Do you remember the first post when we talked about what is and what is not Threat Hunting? Well, an essential part of it is the generation of intelligence. It’s good that we are the best…

Cybersecurity

5 min read

Hunting threats without leaving home- Part V
Hunting threats without leaving home- Part V
Cybersecurity

5 min read


Apr 10

Hunting threats without leaving home — Part IV

Grafiki 🐵 In this post I will cover something very special to me. In the previous entries Intro I, Intro II and Analizing our data, we saw the exploitation of information with Kibana and its usefulness in seeing potential anomalies at a glance. …

Cybersecurity

6 min read

Hunting threats without leaving home — Part IV
Hunting threats without leaving home — Part IV
Cybersecurity

6 min read


Apr 10

Hunting threats without leaving home — Part III

Analizing the data with Kibana Hey, hunters! How’s the hunting season going? After what we saw in previous posts Intro I and Intro II, in this article we will continue to understand and improve our Threat Hunting lab. We have already learned how to enter our data about real attacks…

Cybersecurity

4 min read

Hunting threats without leaving home — Part III
Hunting threats without leaving home — Part III
Cybersecurity

4 min read


Apr 10

Hunting threats without leaving home — Part II

Feeding our lab The data In the last post we set a platform to store the data. Now we need to feed it with some data. One way would be to install Windows virtual machines, Winlogbeat and Sysmon, but we will do that later. Now I want to talk about Mordor. Mordor

Cybersecurity

5 min read

Hunting Threats without leaving home — Part II
Hunting Threats without leaving home — Part II
Cybersecurity

5 min read


Apr 10

Hunting threats without leaving home — Part I

Intro Many times, talking to friends who work in other professions, I tell them how lucky we are, those of us who work in the IT industry. We, unlike 99% of the occupations, can create realistic environments for testing, learning, practicing… and when we are done with those environments we…

Cybersecurity

7 min read

Hunting threats without leaving home — Part I
Hunting threats without leaving home — Part I
Cybersecurity

7 min read


Dec 2, 2022

Hunting Office Macros with Sysmon and Pandas.

Using Pandas and Jupyter everywhere 🐼🪐 During these last months I have been studying the course SEC530: Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise, during this course and certification there are different ways to implement a methodology oriented to “Zero Trust” and among the topics…

Cybersecurity

7 min read

Hunting Office Macros with Sysmon and Pandas.
Hunting Office Macros with Sysmon and Pandas.
Cybersecurity

7 min read


Published in

Towards Data Science

·Aug 19, 2021

How Data Science Could Make Cybersecurity Troubleshooting Easier: Firewall Logs Analysis

Improving incident response ops. with data analysis techniques and tools. — Without a doubt we are in the information age, there have never been so many sources of information and in the cybersecurity sector it is no different. When someone starts working in data analysis he constantly hears that most of the time is spent in processing, correcting and standardizing the…

Cybersecurity

10 min read

How Data Science Could Make Cybersecurity Troubleshooting Easier: Firewall Logs Analysis
How Data Science Could Make Cybersecurity Troubleshooting Easier: Firewall Logs Analysis
Cybersecurity

10 min read


Published in

Towards Data Science

·Aug 12, 2021

Hunting threats with Pandas 🐼👊 — $MFT Analysis

Improving incident response with data analysis techniques and tools. — It is really exciting to see the direction that, in my opinion, cybersecurity is taking. Incident response and even more so Threat Hunting are increasingly linked to the processing of huge amounts of information. I believe this is due on the one hand to the amount of telemetry stored and/or generated…

Data Analysis

6 min read

Hunting threats with Pandas 🐼👊 — $MFT Analysis
Hunting threats with Pandas 🐼👊 — $MFT Analysis
Data Analysis

6 min read


Jun 3, 2021

Hunting Cobalt Strike in Memory

I’ve been meaning to get back to writing for a while now and have finally been able to carve out some time for it, so hunting season is back! The time has come to play with Cobalt Strike in my lab due to the number of security incidents in which…

Cybersecurity

8 min read

Hunting Cobalt Strike in Memory
Hunting Cobalt Strike in Memory
Cybersecurity

8 min read

Luis Francisco Monge Martinez

Luis Francisco Monge Martinez

53 Followers

Cyber incident response analyst obsessed with the data analysis.

Following
  • TDS Editors

    TDS Editors

  • Bex T.

    Bex T.

  • Skanda Vivek

    Skanda Vivek

  • Karol Mazurek

    Karol Mazurek

  • István Tóth

    István Tóth

See all (43)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams